junos-network

Warn

Audited by Gen Agent Trust Hub on Mar 6, 2026

Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The skill manages a local device inventory file (devices.json) that stores sensitive connection details, including IP addresses, usernames, cleartext passwords, and paths to private SSH keys such as /home/user/.ssh/junos_key.
  • [COMMAND_EXECUTION]: Provides tools for executing arbitrary JunOS CLI commands and committing configuration changes, which are high-impact operations on production network infrastructure. Evidence includes the execute_junos_command, execute_junos_command_batch, and load_and_commit_config tools.
  • [EXTERNAL_DOWNLOADS]: Downloads the underlying MCP server from the official Juniper GitHub repository and requires multiple third-party Python libraries for network transport and parsing, such as paramiko, ncclient, and junos-eznc.
  • [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface due to its data ingestion model. 1. Ingestion points: The agent processes CLI output, running configurations, and device facts retrieved from remote network devices. 2. Boundary markers: No explicit delimiters or instructional guardrails are defined in the tool definitions to isolate device-supplied data from the agent's reasoning. 3. Capability inventory: The skill has extensive capabilities including remote command execution, configuration modification, and local file access for inventory management. 4. Sanitization: There is no evidence of content sanitization or validation for data returned from network devices before it is integrated into the agent's context.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 6, 2026, 12:31 AM